Category Archives: Security Knowledge

feature_blog_gooligan
Alerts & Outbreaks, Security Knowledge [Dec, 2, 2016]

Gooligan Android malware breaches 1 million Google Play accounts

The largest Google account breach is affecting as many as 13,000 Android users every day. The main objective of the malware is to increase ad revenue for its developers but there are greater implications such as data theft and third-party access to devices.

feature_blog_tech
Security Knowledge [Nov, 17, 2016]

Microsoft calling? Mind the tech support scammer!

Popups on your computer telling you that your computer is infected may not be all that they seem. Many scammers are now using popups to scare users into calling for tech support only to be harassed into purchasing services they don’t need.

feature_blog_help
Emsisoft Lab, Emsisoft News, Security Knowledge [Nov, 16, 2016]

When the tables turn and hackers cry for help

Once again Fabian Wosar, security researcher and head of Emsisoft Lab is the target of ransomware developers. Only this time, the hackers need his help.

feature_blog_decrypters
Emsisoft News, Security Knowledge [Nov, 4, 2016]

The Inside Joke: Ransomware hackers need attention, too

Once again the target of malware developers, our security researchers take on twitter trolls and decrypt your files for free.

feature_blog_login
Security Knowledge [Oct, 16, 2016]

30 seconds and 50 dollars is all it takes to steal your PC login

Many people believe that leaving their computer unattended won’t pose any security risks as long as their device is locked. However, researcher Rob Fuller, of R5 Industries demonstrates that an attacker with physical access to your device can access your login details in seconds.

feature_blog_malware_toys
Security Knowledge [Oct, 13, 2016]

Malware in sex toys: How private is your playtime?

The Internet of Things is a growing area that seems to have no boundaries. It was only a matter of time before it would catch up with the sex toy industry. Malware can infect any internet capable device allowing access to the most private details of pleasure seekers.

feature_blog_hackers_vs_hackers
Security Knowledge [Oct, 2, 2016]

No honour among thieves: hackers who hack each other

Ransomware has become a highly lucrative profit earner for cyber criminals. So much so that hackers are now sabotaging the malware of their competitors to secure their share of victims.

feature_blog
Alerts & Outbreaks, Security Knowledge [Sep, 23, 2016]

Yahoo hack hits half a billion users

In the biggest data leak ever made public, Yahoo announces that half a billion user accounts have been compromised. Here’s what you need to know.

feature_blog_good_bad_hacker
Security Knowledge [Sep, 22, 2016]

Are all hackers criminals?

Not all hackers are created equal. Did you know there are different kinds? The key to categorising them lies in permission.

feature_blog_gillespie
Security Knowledge [Sep, 22, 2016]

How to identify your ransomware infection to find the right decrypter tool

We spoke with Michael Gillespie at Malware Hunter Team, a group of researchers who share our commitment to protecting you and your data, have developed a website that will allow you to find out what type of ransomware your computer has been infected with and if there is a decryption tool available.

feature_blog_apocalypse
Security Knowledge [Sep, 2, 2016]

Fabiansomware: when hackers lose it

Our lab works to crack new strains of ransomware and as a result are often at the receiving end of abuse from hackers who can no longer profit from their malware. Recently, the abuse has become personal with abuse being coded directly into new variants aimed directly at Fabian, the head of our Malware Lab.

feature_blog_backup
Security Knowledge [Aug, 29, 2016]

The smartest way to stay unaffected by ransomware? Backup!

Ransomware is now the most consistently problematic type of malware to effect internet capable devices and businesses. A solid protection suite is vital but there is a second important step to protect your data – Backup.

feature_blog_medical
Security Knowledge [Aug, 10, 2016]

The alarming state of computer security in healthcare

Life support machines can be the difference between life and death. But did you know they can also be an easy access point for hackers to access hospital networks and steal private patient information?

feature_blog_pokemon
Security Knowledge [Jul, 12, 2016]

Pokemon GO: giving hackers direct access to your phone

Pokemon Go has taken over cities worldwide, but has it also given hackers access to take over your phone?

feature_blog_protection
Security Knowledge [Jul, 7, 2016]

The malware landscape has shifted – These online threats are waiting for you in 2016

Cybercrime has not been deterred by modern security methods. With data being held for ransom and banking fraud running rampant, individual users are at a greater risk than ever.

feature_blog_apocalypse
Security Knowledge [Jun, 29, 2016]

Apocalypse: Ransomware which targets companies through insecure RDP

New ransomware threats appear almost daily. This week the Emsisoft Team took a look at a new ransomware family which reared it’s ugly head around two months ago and began hurling abuse at our staff. Meet Apocalypse, learn how it works and how you can protect your data.

feature_blog_public_wifi
Security Knowledge [Jun, 28, 2016]

Public Wi-Fi – is it safe?

Free public Wi-Fi offers you quick access to the internet while you’re out and about, but is it safe? Here, the Emsisoft team explores the dangers of public wifi and offers solutions to keep your data safe.

feature_blog_pup
Security Knowledge [Jun, 20, 2016]

Potentially Unwanted Programs slow down your system and can be harmful: Here’s what can you do about it

What is a PUP? The Emsisoft team offers advice to recognize unwanted programs and practical tips on how to remove them.